The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Ubuntu

vulnerability bulletin CVE-2018-6260

NVIDIA: information disclosure via GPU Performance Counters

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via GPU Performance Counters of NVIDIA, in order to obtain sensitive information.
Impacted products: Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 08/03/2019.
Identifiers: CVE-2018-6260, USN-3904-1, VIGILANCE-VUL-28693.

Description of the vulnerability

The NVIDIA product offers a web service.

However, an attacker can bypass access restrictions to data.

An attacker can therefore use a vulnerability via GPU Performance Counters of NVIDIA, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2018-20781

GNOME Keyring: information disclosure via PAM Module Login Credentials

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via PAM Module Login Credentials of GNOME Keyring, in order to obtain sensitive information.
Impacted products: Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 26/02/2019.
Identifiers: CVE-2018-20781, USN-3894-1, VIGILANCE-VUL-28601.

Description of the vulnerability

An attacker can bypass access restrictions to data via PAM Module Login Credentials of GNOME Keyring, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-20650

Poppler: assertion error via Object-dictLookup

Synthesis of the vulnerability

An attacker can force an assertion error via Object::dictLookup() of Poppler, in order to trigger a denial of service.
Impacted products: Fedora, Ubuntu.
Severity: 2/4.
Consequences: denial of service on service, denial of service on client.
Provenance: document.
Creation date: 22/01/2019.
Identifiers: CVE-2018-20650, FEDORA-2019-40f4af0687, FEDORA-2019-7ff7f5093e, FEDORA-2019-b0bd3c604a, USN-3865-1, VIGILANCE-VUL-28328.

Description of the vulnerability

An attacker can force an assertion error via Object::dictLookup() of Poppler, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-20481

Poppler: NULL pointer dereference via XRef-getEntry

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via XRef::getEntry() of Poppler, in order to trigger a denial of service.
Impacted products: Debian, Fedora, Ubuntu.
Severity: 2/4.
Consequences: denial of service on service, denial of service on client.
Provenance: document.
Creation date: 22/01/2019.
Identifiers: CVE-2018-20481, DLA-1706-1, FEDORA-2019-40f4af0687, FEDORA-2019-7ff7f5093e, FEDORA-2019-b0bd3c604a, USN-3865-1, VIGILANCE-VUL-28327.

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via XRef::getEntry() of Poppler, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2019-3462

apt: Man-in-the-Middle

Synthesis of the vulnerability

An attacker can act as a Man-in-the-Middle on apt, in order to read or write data in the session, so a malicious package is installed.
Impacted products: Debian, Ubuntu.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: internet server.
Creation date: 22/01/2019.
Identifiers: CERTFR-2019-AVI-030, CVE-2019-3462, DLA-1637-1, DSA-4371-1, USN-3863-1, USN-3863-2, VIGILANCE-VUL-28323.

Description of the vulnerability

An attacker can act as a Man-in-the-Middle on apt, in order to read or write data in the session, so a malicious package is installed.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-9568

Linux kernel: memory corruption via sk_clone_lock

Synthesis of the vulnerability

An attacker can trigger a memory corruption via sk_clone_lock() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Android OS, Linux, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 18/01/2019.
Identifiers: CERTFR-2019-AVI-038, CERTFR-2019-AVI-042, CERTFR-2019-AVI-044, CERTFR-2019-AVI-051, CERTFR-2019-AVI-071, CERTFR-2019-AVI-112, CERTFR-2019-AVI-114, CVE-2018-9568, openSUSE-SU-2019:0065-1, openSUSE-SU-2019:0140-1, RHSA-2019:0512-01, RHSA-2019:0514-01, SUSE-SU-2019:0148-1, SUSE-SU-2019:0196-1, SUSE-SU-2019:0222-1, SUSE-SU-2019:0224-1, SUSE-SU-2019:0320-1, SUSE-SU-2019:0439-1, SUSE-SU-2019:0541-1, SUSE-SU-2019:13937-1, SUSE-SU-2019:13979-1, USN-3880-1, USN-3880-2, VIGILANCE-VUL-28304.

Description of the vulnerability

An attacker can trigger a memory corruption via sk_clone_lock() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-11790

Apache OpenOffice: integer overflow via Small End Line Termination

Synthesis of the vulnerability

An attacker can trigger an integer overflow via Small End Line Termination of Apache OpenOffice, in order to trigger a denial of service, and possibly to run code.
Impacted products: OpenOffice, Ubuntu.
Severity: 2/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 16/01/2019.
Identifiers: CVE-2018-11790, USN-3883-1, VIGILANCE-VUL-28296.

Description of the vulnerability

An attacker can trigger an integer overflow via Small End Line Termination of Apache OpenOffice, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-20615

HAProxy: denial of service via HTTP/2 Priority Flag

Synthesis of the vulnerability

An attacker can trigger a fatal error via HTTP/2 Priority Flag of HAProxy, in order to trigger a denial of service.
Impacted products: Fedora, openSUSE Leap, RHEL, SLES, Ubuntu.
Severity: 2/4.
Consequences: denial of service on service, denial of service on client.
Provenance: intranet client.
Creation date: 15/01/2019.
Identifiers: CVE-2018-20615, FEDORA-2019-0398d1b049, FEDORA-2019-c7da53319c, openSUSE-SU-2019:0166-1, RHSA-2019:0275-01, SUSE-SU-2019:0232-1, USN-3858-1, VIGILANCE-VUL-28274.

Description of the vulnerability

An attacker can trigger a fatal error via HTTP/2 Priority Flag of HAProxy, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2018-10910

GNOME Bluetooth: privilege escalation via BlueZ Visibility

Synthesis of the vulnerability

An attacker can bypass restrictions via BlueZ Visibility of GNOME Bluetooth, in order to escalate his privileges.
Impacted products: Ubuntu.
Severity: 2/4.
Consequences: user access/rights, data reading, data creation/edition.
Provenance: radio connection.
Creation date: 15/01/2019.
Identifiers: CVE-2018-10910, USN-3856-1, VIGILANCE-VUL-28270.

Description of the vulnerability

An attacker can bypass restrictions via BlueZ Visibility of GNOME Bluetooth, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2019-6128

LibTIFF: memory leak via TIFFFdOpen

Synthesis of the vulnerability

An attacker can create a memory leak via TIFFFdOpen() of LibTIFF, in order to trigger a denial of service.
Impacted products: LibTIFF, Ubuntu.
Severity: 1/4.
Consequences: denial of service on service, denial of service on client.
Provenance: document.
Creation date: 14/01/2019.
Identifiers: 2836, CVE-2019-6128, USN-3906-1, USN-3906-2, VIGILANCE-VUL-28268.

Description of the vulnerability

An attacker can create a memory leak via TIFFFdOpen() of LibTIFF, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Ubuntu: